Early Security Testing with Burp Suite Proxy: A Shift-Left Strategy

Danielle
4 min readDec 9, 2024

--

In today’s ever-evolving cybersecurity landscape, securing application endpoints remains a critical challenge. Despite current strategies and practices, attackers continue to find new ways to exploit vulnerabilities. If your company lacks awareness of application security testing tools such Burp Suite, especially in the early stages, you are vulnerable to attacks which can impact your company’s application, assets and reputation. This highlights the need for your company to be proactive, and to “shift-left”, which means including security processes early in the software development lifecycle.

Welcome to the “Shifting Left with Burp Suite” blog series! In this opening post, you’ll explore the Burp Suite Community Edition, discover its key benefits, get an overview of its interface, and learn how to use it as a Proxy.

Why Shifting Left Matters

Companies have a wide range of strategies and practices to secure application endpoints, from Threat Modeling to infrastructure security scanning. These efforts often include automated tools such as SonarQube, Snyk, and Wiz to identify and address vulnerabilities. While valuable, these tools sometimes miss vulnerabilities, leaving gaps that attackers can exploit. This is where Burp Suite comes in.

Introducing Burp Suite

Burp Suite is a set of cybersecurity tools designed for testing web applications. It is widely used by security professionals, including ethical hackers and penetration testers, however due to the recent shift-left movement software engineers are using this tool early on in the software development lifecycle. Burp Suite provides various features to help identify vulnerabilities in web applications during the development and testing phases. Key benefits include:

Customisable and Manual Testing: With Burp Suite, you can perform both automated scans and manual testing, allowing you to customise your approach to meet the specific needs of your application.

Proxy Functionality: The suite’s proxy feature lets you intercept and analyse HTTP/S traffic, giving you insight into how data is transmitted and helping you identify potential security issues. You can also modify requests and responses for more thorough testing.

Request Replay and Modification: Using the Repeater tool, you can replay HTTP requests and observe how the application responds, enabling you to simulate various inputs and uncover hidden vulnerabilities.

Automation of Attacks: With tools such as the Intruder, you can automate attacks such as brute force or parameter manipulation, helping you discover vulnerabilities that might go unnoticed during automated testing.

Burp Suite Community Edition

In this series, we will be using the Burp Suite Community Edition, which is free to download and available on Windows, Mac, and Linux. We will be using the Gin and Juice Shop, an e-commerce website created by PortSwigger, the company behind Burp Suite. This website is intentionally packed with vulnerabilities, let’s see what we can uncover. In this blog, we will focus on capturing traffic using the Proxy feature. Before we take a look at the Proxy, let’s take a look at the Burp Suite interface.

Burp Suite Community Edition Interface

At a first glance, there is a lot going on — but let’s break this down. The Burp Suite Community Edition interface is organised into rows, each serving a distinct purpose. At the top, the menu bar gives you access to project configurations and help documentation. Below that, the tool tabs row allows you to switch between the various suite tools, including Proxy, Intruder, Repeater, and more. Further down, you’ll find specific actions for each tool, such as intercepting traffic and viewing HTTP history in the Proxy tool. Burp Suite also provides helpful instructions, with an orange button indicating an action, keep an eye out for this.

Intercepting Traffic with Burp Proxy

Burp Proxy is a tool for intercepting, inspecting, and modifying web traffic between your browser and target web applications. Here’s what makes it invaluable:

  • Intercept and Modify Traffic: Capture and modify HTTP/S requests and responses in real time.
  • Effortless History Management: Unlike tools like Developer Tools, Charles Proxy, or Postman, Burp Suite automatically saves your traffic history, ensuring no data is lost during your session.
  • Deep Analysis Capabilities: After capturing traffic, you can inspect and manipulate HTTP(S) requests and responses, including headers, body content, and even API routes. This works with multiple data formats including: JSON, XML, URL-encoded data.
Gin and Juice Shop

Let’s take a look how we can capture data from the Gin and Juice shop into Burp Suite.

  1. In BurpSuite, select Proxy
  2. Click on Intercept
  3. Select Open browser
  4. In your browser go to the https://ginandjuice.shop/
  5. Select Products
  6. Click on Pineapple Edition Cocktail
  7. Change the item quantity to 15
  8. Click on Add to cart
  9. Go back to Burp Suite
  10. Select HTTP history
  11. Find the POST /catalog/cart request
Burp Suite — Request Captured

In the request, you can see the request attributes, body parameters, cookies, request headers and response headers. You can also view the response.

What can we do with this?

Once we have the traffic, we unlock a wealth of possibilities:

  • Identify insecure APIs or poorly configured endpoints.
  • Modify captured requests to test the application’s response to unexpected inputs.
  • Simulate attacks to uncover vulnerabilities before they become real threats.

In the next blog post, we will cover what we can do with this captured request to uncover vulnerabilities.

Summary

By integrating tools like Burp Suite into your development pipeline, you’re taking a proactive approach to security. This aligns with the shift-left movement, allowing your teams to identify and address vulnerabilities early, before they become costly or damaging.

Links

Download Burp Suite Community Edition

Gin and Juice Shop: put your scanner to the test

--

--

Danielle
Danielle

Written by Danielle

Senior Software Engineer 👩🏽‍💻

No responses yet